Processed through Paypal
No account required.
Donate Bitcoin to this wallet:
Donate Ethereum to this wallet:
Donate Litecoin to this wallet:
| RDP-Parser v1.1
RDP-Parser v1.1 RDP-Parser extracts RDP activities from Microsoft Windows Event Logs. This tool has been designed for any investigation involving exploitation of RDP service. It supports Evt and Evtx formats. How it works This is a command line tool and there is no installer. You should unzip and copy the program where you want to use it. Open a command line in the directory where the program is. You can print help message using "RDP-Parser --h": More details about options: --p: By default, RDP-Parser will check in the current directory, so you can copy the program in the same folder as the Event Logs you want to parse. If there is no given path and current directory doesn't contain Event Logs, RDP-Parser will copy the live system Event Logs in the current directory. This command require admin priviledge and it doesn't work for old format logs. --t: There are three types of report: 1: minimal: This is the default type. The report will contain following columns: TimeGenerated, Source, EventID and Details. Only events with public IP addresses will be extracted and all details will be removed except IP address. 2: minimal with all IP addresses: Same as type 1, but it also includes private IP addresses. 3: normal: The report will contain all columns and all details. Columns are: TimeGenerated, Timewritten, Computer, Source, RecordNumber, Category, EventID, EventType and Details. Only events with public IP addresses will be extracted but all details will be included. 4: normal with all IP addresses: Same as type 3, but it also includes private IP addresses. 5: full: All events related to RDP or login activities will be included. Included events IDs are: ...
|275||Feb 27, 2019
|Showing rows 1 to 1 of 1||Showing Page 1 of 1||1|
Copyright (c) 2019